Unlock the next level of Android security analysis in our hands-on AI-Augmented Reverse Engineering training. You will learn to wield both local and online Large Language Models to accelerate decompilation, automate Frida script generation, and supercharge your workflow in Jadx and Ghidra. From intelligent code annotation to automated reporting, this course will redefine how you approach APK analysis.
This hands-on training explores how AI and Large Language Models (LLMs) can augment the reverse engineering and security analysis of Android applications. Participants will learn to leverage both local and online LLMs to assist with decompiling, annotating, and analyzing APKs and native libraries. The training introduces Multi-Client Plugins (MCPs) to enhance static analysis tools like Jadx and Ghidra, and walks through real-world usage of LLMs for code refactoring, Frida script generation, fuzzing harness creation, and automated reporting. The course blends static and dynamic analysis with AI-assisted tooling, culminating in a hands-on project where participants reverse a complex APK using AI throughout the process.
Day 1 : AI-Augmented Static Analysis
Module 1 | Introduction & Setup
Module 2 | AI Overview for Reverse Engineers
Module 3 | Jadx MCP + AI-enhanced Analysis
Module 4 | Ghidra MCP + AI Integration
Module 5 | AI-Powered Decompilation Refactoring
Module 6 | Practice Challenge
Day 2 : Dynamic Analysis + AI-Powered Automation
Module 7 | Frida Script Generation with AI
Module 8 | AI-Driven Fuzzing Harness Generation
Module 9 | Using Nuclei AI for Mobile Security
Module 10 | Automated Reporting with LLMs
Module 11 | Final Hands-on Project
Guerric ELOI is a cybersecurity researcher at FuzzingLabs focused on Android and iOS security. He identifies high-impact vulnerabilities through penetration testing, reverse engineering, and bug bounty programs, working with vendors to prevent major threats. He also delivers practical training on mobile security and builds custom tools to automate vulnerability discovery and strengthen system defenses.
Nabih is the COO of FuzzingLabs. Over the last 3.5 years he has moved from intern to security engineer, team lead, and now operations lead. His work focuses on fuzzing and vulnerability research, writing and maintaining tools in C, Python, Rust, and Go. He earned his cybersecurity-engineering degree from EPITA
Founded in 2021 and headquartered in Paris, FuzzingLabs is a cybersecurity startup specializing in vulnerability research, fuzzing, and blockchain security. We combine cutting-edge research with hands-on expertise to secure some of the most critical components in the blockchain ecosystem.
Contact us for an audit or long term partnership!
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |